[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
www/proprietary malware-apple.es.html po/malwar...
From: |
GNUN |
Subject: |
www/proprietary malware-apple.es.html po/malwar... |
Date: |
Thu, 4 Aug 2016 14:30:06 +0000 (UTC) |
CVSROOT: /web/www
Module name: www
Changes by: GNUN <gnun> 16/08/04 14:30:06
Modified files:
proprietary : malware-apple.es.html
proprietary/po : malware-apple.es-en.html
Log message:
Automatic update by GNUnited Nations.
CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.23&r2=1.24
Patches:
Index: malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- malware-apple.es.html 17 Jul 2016 09:58:34 -0000 1.29
+++ malware-apple.es.html 4 Aug 2016 14:30:06 -0000 1.30
@@ -138,6 +138,14 @@
<ul>
<li>
+ <p>Una vulnerabilidad en la interfaz de programación (API) <cite>Image
+I/O</cite> de Apple permitÃa a un atacante <a
+href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">ejecutar
+código malicioso desde cualquier aplicación que utilizara esta API para
+renderizar cierto tipo de archivos de imagen</a>.</p>
+ </li>
+
+ <li>
<p>Un fallo en la aplicación de mensajerÃa de las iCosas <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">permitió
a un sitio web malicioso obtener todo el historial de mensajes del
@@ -485,7 +493,7 @@
<p class="unprintable"><!-- timestamp start -->
Ãltima actualización:
-$Date: 2016/07/17 09:58:34 $
+$Date: 2016/08/04 14:30:06 $
<!-- timestamp end -->
</p>
Index: po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/malware-apple.es-en.html 17 Jul 2016 09:58:34 -0000 1.23
+++ po/malware-apple.es-en.html 4 Aug 2016 14:30:06 -0000 1.24
@@ -123,6 +123,13 @@
<ul>
<li>
+ <p>A vulnerability in Apple's Image I/O API allowed an attacker
+ to <a
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple">execute
+ malacious code from any application which uses this API to render
+ a certain kind of image file</a>.</p>
+ </li>
+
+ <li>
<p>A bug in the iThings Messages
app <a
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/">allowed
a malicious web site to extract all the user's messaging history</a>.
@@ -431,7 +438,7 @@
<p class="unprintable">Updated:
<!-- timestamp start -->
-$Date: 2016/07/17 09:58:34 $
+$Date: 2016/08/04 14:30:06 $
<!-- timestamp end -->
</p>
</div>
[Prev in Thread] |
Current Thread |
[Next in Thread] |
- www/proprietary malware-apple.es.html po/malwar...,
GNUN <=